Author of the publication

Topology Imbalance and Relation Inauthenticity Aware Hierarchical Graph Attention Networks for Fake News Detection.

, , , , and . COLING, page 4687-4696. International Committee on Computational Linguistics, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multidocument Arabic Text Summarization Based on Clustering and Word2Vec to Reduce Redundancy., , , and . Information, 11 (2): 59 (2020)ELFIC: A Learning-based Flexible Image Codec with Rate-Distortion-Complexity Optimization., , , , , and . ACM Multimedia, page 9252-9261. ACM, (2023)Beyond Keypoint Coding: Temporal Evolution Inference with Compact Feature Representation for Talking Face Video Compression., , , , , and . DCC, page 13-22. IEEE, (2022)Towards Ultra Low Bit-Rate Digital Human Character Communication via Compact 3D Face Descriptors., , , , and . DCC, page 461. IEEE, (2022)A logistic regression based algorithm for identifying human disease genes., , , and . BIBM, page 197-200. IEEE Computer Society, (2014)Enhancing Steganography via Stego Post-processing by Reducing Image Residual Difference., , and . IH&MMSec, page 63-68. ACM, (2019)Enhancing JPEG Steganography using Iterative Adversarial Examples., , , , and . WIFS, page 1-6. IEEE, (2019)Copy number variation related disease genes., , and . Quant. Biol., 6 (2): 99-112 (2018)Background of Semantic Intelligence Research and the Principle of Technical Framework., , , and . ICCSIP (2), volume 1006 of Communications in Computer and Information Science, page 85-92. Springer, (2018)Bringing LTE to Unlicensed Spectrum: Technical Solutions and Deployment Considerations., , , , and . CAMAD, page 1-7. IEEE, (2018)